lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 May 2007 02:29:52 +0200 From: Segher Boessenkool <segher@...nel.crashing.org> To: linas@...tin.ibm.com (Linas Vepstas) Cc: Jeff Garzik <jgarzik@...ox.com>, cbe-oss-dev@...abs.org, Michael Ellerman <michael@...erman.id.au>, netdev@...r.kernel.org Subject: Re: [Cbe-oss-dev] [PATCH 4/10] spidernet: zero out a pointer. >> If you're going to be paranoid, shouldn't you do something here to >> make >> sure the value's hit the device? > > I thought the whole point of paranoia is that its inexplicable. > > Here's a delusional reply: I didn't see any point to it. > 1) a wmb would add overhead A wmb() doesn't guarantee the write has reached the device. > 2) the hardware is supposed to be looking at the status flag, > anyway, and not misbehaving. But you're paranoid, right? Can't trust that device! :-) Segher - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists